Infosecurity Opinions
Strengthening Your Digital Core
If your digital core is weak, what gets thrown off is your organization’s ability to maintain operations, serve customers and generate revenue.
Halfway Through 2018, is This the Year of the Insider Threat?
Insider threats range from unintentional errors and compromised credentials, to a lack of basic cybersecurity hygiene, all the way through to malevolent insiders.
The Dawn of a New Digital Era for Healthcare Organizations
With the NHS ready to adopt cloud technology, could this better protect UK healthcare?
The Two-Step Process to Fix the Internet's Identity Problem
Two steps to get over the internet's identity problem.
Will a New SOC Help the NHS Stop the Next WannaCry?
The implementation of an SOC is a firm step in the right direction for the NHS, but it must provide the visibility and secure access required for a massive operation like the NHS.
From Zero Day Attack to Zero Day Recovery
With Zero Day Recovery, data can be recovered quickly, minimizing or even eliminating the damage that a destructive cyber-attack would have caused the business.
Advanced Persistent Agony: Fixing the Broken Data Breach Response Template
The standard response playbook to a major data breach is harmful to security professionals.
How to Balance Security with Digital Transformation
IT security professionals are struggling to keep up with the technologies that drive digital transformation.
Overcoming the Siloed Network Security Challenge
Unlike IT teams, cyber-criminals aren’t constrained by lines of business, siloed technology teams, or carefully guarded network domains.
The New Age of Accountability
Accountability refers to an obligation on individuals and businesses to be held responsible for their data protection actions and activities, and to accept liability for data breaches.
Security AI is more than an Algorithm
All analytics will be more effective when provided with rich, high-fidelity sources of data.
Is Sandboxing a Playground for Browser-Borne Threats?
Given today’s evasive threats, will sandboxing be considered an adequate form of security for much longer?
Phishing in the Deep End: The Growing Threat of Attacks Beyond Email
The primary target has now become the unsuspecting person using these devices and systems.
Mitigating IoT Cyber Risks: Training is the First Step
Roles which five years ago we would never have thought of as requiring cybersecurity training, will need it as adoption of connected devices continues to rise.
It Started with a Phish
The four key elements of an anti-phishing program.
Are Bug Bounty Programs the Answer to Secure Endpoints?
Like with any security protection, don’t just rely on one form – bug bounties aren’t a silver bullet.
Shrouding IoT Security in the Fog
By virtue of its distributed architecture, fog computing secures everything from the cloud to the device.
Protecting a Mobile Workforce with Hybrid DNS Security
The root of many of data breaches, and the damage and stress that accompanies them, lies the DNS.
Eight Weak Links that Make Cryptocurrency Exchanges Vulnerable
The security of cryptocurrency is irrelevant if the exchange in which it is stored it is not secure.
Nice Quotes, But I Wouldn’t Take Cybersecurity Advice from Alphonse Karr
Changes are both the enemy and the ally of cybersecurity, but in both cases, it is absolutely not the case that security is unaffected by change.